CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [36]
a. Internet
b. Intranet
c. Extranet
d. NAT
9. Which of the following protocols allows an organization to present a single TCP/IP address to the Internet while utilizing private IP addressing across the LAN?
a. NAT
b. VLAN
c. DMZ
d. Extranet
10. You’re the administrator for Mercury Technical. Due to several expansions, the network has grown exponentially in size within the past two years. Which of the following is a popular method for breaking a network into smaller private networks that can coexist on the same wiring and yet be unaware of each other?
a. VLAN
b. NAT
c. MAC
d. Security zone
11. Of the following services, which one would be most likely to utilize a retinal scan?
a. Auditing
b. Authentication
c. Access control
d. Data confidentiality
12. One of the vice presidents of the company calls a meeting with information technology after a recent trip to competitors’ sites. She reports that many of the companies she visited granted access to their buildings only after fingerprint scans, and she wants similar technology employed at this company. Of the following, which technology relies on a physical attribute of the user for authentication?
a. Smart card
b. Biometrics
c. Mutual authentication
d. Tokens
13. Which technology allows a connection to be made between two networks using a secure protocol?
a. Tunneling
b. VLAN
c. Internet
d. Extranet
14. A new director of information technology has been hired, and you report directly to him. At the first meeting, he assigns you the task of identifying all the company resources that IT is responsible for and assigning a value to each. The process of determining the value of information or equipment in an organization is referred to as which of the following?
a. Asset identification
b. Risk assessment
c. Threat identification
d. Vulnerabilities scan
15. You have been asked to address a management meeting and present the types of threats your organization could face from hackers. Which of the following would best categorize this type of information?
a. Asset identification
b. Risk assessment
c. Threat identification
d. Vulnerabilities
16. Over the years, your company has upgraded its operating systems and networks as it has grown. A recent survey shows that numerous databases on the network haven’t been accessed in more than a year. Unfortunately, the survey doesn’t identify who created or last accessed those databases. Which aspect of design goals would involve determining who owns a particular database file?
a. Auditing
b. Access control
c. Threat analysis
d. Accountability
17. A user just complained to you that his system has been infected with a new virus. Which of the following would be a first step to take in addressing and correcting this problem?
a. Verifying that the most current virus definition file is installed
b. Reformatting the hard disk
c. Reinstalling the operating system
d. Disabling the user’s e-mail account
18. You’re awakened in the middle of the night by a frantic junior administrator. The caller reports that the guest account—which you have forbidden anyone to use—suddenly logged in and out of the network, and the administrator believes an attack occurred. Which of the following would be the most useful in determining what was accessed during an external attack?
a. System logs
b. Antivirus software
c. Kerberos
d. Biometrics
19. You want to install a server in the network area that provides web services to Internet clients. You don’t want to expose your internal network to additional risks. Which method should you implement to accomplish this?
a. Install the server in an intranet.
b. Install the server in a DMZ.
c. Install the server in a VLAN.
d. Install the server in an extranet.
20. Your company provides medical data to doctors from a worldwide